Here at Business Computer Solutions, your security is our priority. Each year, more sophisticated ways of retrieving your data illegally are being reported and cyber-attacks are evolving and occurring more than ever.

Are your staff trained on cyber-crime? Do they know what a phishing email looks like? Are they aware of the importance of changing their password regularly? Our team of helpful ninjas have provided some useful hints, tips and terminology, to help you, your staff and organisation stay safe:

Terminology:

Baiting– A USB drive or another electronic media device is passed to you, which is pre-loaded with malware.

Keystroke logging (Key logger)– Spyware that is used for covertly recording the keys struck on a keyboard. The log file created by the key logger can then be sent to a specified recipient. By examining the key log data, it may be possible to find private information such as usernames and passwords.

Worms –A type of virus that replicates itself, but does not alter any files on your machine. However, worms can still create chaos by multiplying so many times that they take up all your computer’s available memory or hard disk space. If a worm consumes your memory, your computer will run very slowly and possibly even crash.

Trojan Horses –Software programs that look like regular programs, such as games and even antivirus programs. Once they are run, these programs can do malicious things to your computer.

Password protection hints and tips:

When creating a new password, it is best to use a mixture of lower case & upper case letters, numbers and unique characters. An example of this would be NiNjABcS3*6#5!

Change your password on a regular basis and make sure it is different each time. Try not to re-use old passwords.

Never write your passwords down on paper or save them in your mobile device. If that information gets into the wrong hands, accessing your accounts will be easy.

While connected to public Wi-Fi, avoid accessing sensitive information which requires password entry. Public Wi-Fi networks are not always protected and your data could potentially be at risk.

Never provide your password information online or over the telephone. Be aware of suspicious emails which may contain phishing links, trying to access your personal details.

Internet security hints and tips:

Out of date security software – Implementing the latest security software across all of your IT hardware is vitally important. Recent statistics reveal that many companies do not use reliable anti-virus software. To keep your systems clean and free of harmful malware, invest in security software and be sure to carry out regular updates.

Zero access prevention –Cyber-criminals are more interested in what’s contained in the hardware rather than the hardware itself. Password protect all business devices to prevent unauthorised access.

Unsecure Wi-Fi Networks – Some companies set up their wireless so it shows the network name to those nearby. It may sound obvious, but ensure your Wi-Fi is secure and encrypted to prevent unauthorised access.

No firewall security – Recent statistics reveal that some organisations do not have firewall security. Installing a firewall provides a solid defence against cyber criminals, malware and viruses.

Poor data backup schedule – Sadly, few companies back up their data regularly, which can often result in costly data loss. Regularly back up to ensure your data and sensitive information is protected.

Hints and tips on how to avoid a cyber-attack:

Set secure passwords and do not share them with anyone.

Keep your operating system, browser, anti-virus and other critical software up to date.

Verify the authenticity of requests from companies or individuals by contacting them directly. If you are asked to provide personal information via e-mail, you can contact the company directly to verify this request.

Pay attention to the URLs of websites you visit. Malicious websites sometimes use a variation in common spelling or a different domain (for example, .com instead of .net).

Turn off the option to automatically download attachments on your e-mails.

Be suspicious of unknown links or requests sent through e-mail or text message. Do not click on unknown links, regardless of who the sender appears to be.

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

disable

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.